Role in IT decision-making process:Align Business & IT GoalsCreate IT StrategyDetermine IT NeedsManage Vendor RelationshipsEvaluate/Specify Brands or VendorsOther RoleAuthorize PurchasesNot Involved

Work Phone:

Company:

Company Size:

Industry:

Street Address

City:

Zip/postal code

State/Province:

Country:

Occasionally, we send subscribers special offers from select partners. Would you like to receive these special partner offers via e-mail?YesNo

Your registration with Eweek will include the following free email newsletter(s):News & Views

By submitting your wireless number, you agree that eWEEK, its related properties, and vendor partners providing content you view may contact you using contact center technology. Your consent is not required to view content or use site features.

By clicking on the "Register" button below, I agree that I have carefully read the Terms of Service and the Privacy Policy and I agree to be legally bound by all such terms.

WEBINAR:On-Demand

NetMotion Wireless announced an intelligent mobile VPN designed to connect, manage, and secure applications, containers, and devices in corporate enterprise mobility management (EMM) environments across major mobile and desktop platforms.

The VPN enables organizations to manage access from Apple iPhones and iPads, Windows tablets and laptops, and Android tablets and phones from a single solution on a per-application basis, the company said.

Administrators can configure one or two-factor authentication for teams and individuals with whatever method is best, and IT can set access policies by department, seniority or device type.

"Old security models are built around protecting resources at a specific location. W with mobile, location is irrelevant," Steve Fallin, senior product manager at NetMotion Wireless, told eWEEK. "Business are realizing tremendous productivity gains from mobile, and highly capable devices and apps are now in the hands of users, making it easy for them to bypass IT if necessary to get their job done. In order to be successful, security teams have to deploy easy to use technologies that enable business productivity while ensuring they still maintain the visibility, control, and diagnostic functionality they need to secure the mobile enterprise."

Further reading

Configuration settings and policies in the platform respond automatically to changes in Active Directory, and mobility administrators can pre-configure and automatically assign authentication profiles, access policies, device settings, and more, based on the operating system, according to NetMotion.

"Over and over again we hear from our customers that users will bypass hard to use applications and overly restrictive security measures and that bootleg IT is incredibly easy with mobile devices and apps," Fallin explained. "If the promise of mobile as a discipline is improved productivity, enterprises must deploy solutions that delight users while not giving up the control they need to manage their business. If they don’t, their investment in mobile is wasted."

The latest release also simplifies over-the-air updates for Windows devices, and brings security features to Windows laptops and tablets that previously only existed for Apple and Android devices.

For example, it automatically detects when hotspots require logging on to a Web portal for access, and facilitates log-on without disabling the VPN, preventing so called 'Evil Twin' and related attacks.

"Mobile is all about decentralization, it has turned the traditional IT security models on their head. In the future, effective security technologies will fade into the background from the user’s perspective," Fallin said. "In successful organizations, IT teams will be seen as enablers of business and trusted experts on getting things done."

He said IT teams can get out ahead of this trend by deploying flexible mobile security solutions that deliver transparent user experiences as reliable as the sunrise, while at the same time leaving themselves with the tools they need to monitor, secure, and troubleshoot their mobile deployment.

"An example of this would be an intelligent mobile VPN that provides high-performance, transparent, resilient connectivity with policy based controls that can manage access by user, device, network, and application for all of the enterprise’s mobile platforms and laptops," he explained.

By submitting your information, you agree that eweek.com may send you eWEEK offers via email, phone and text message, as well as email offers about other products and services that eWEEK believes may be of interest to you. eWEEK will process your information in accordance with the Quinstreet Privacy Policy.

We ran into a problem

We already have your email address on file. Please use the "Forgot your password?" link to create a password, validate your email and login.